1 |
DEMPSEY, David; KELLIHER, Felicity. Industry Trends in Cloud Computing. 2018.
|
2 |
JOSHI, N.; SHAH, S. A Comprehensive Survey of Services Provided by Prevalent Cloud Computing Environments. In: Smart Intelligent Computing and Applications. Springer, Singapore 2019, pp. 413-424, 2018.
|
3 |
https://cloud.google.com/security/security-design/
|
4 |
https://aws.amazon.com/security/
|
5 |
https://gov.ucloudbiz.olleh.com/portal/ktcloudportal.epc.productintro.waf.html
|
6 |
https://cloud.naver.com
|
7 |
Cloud Security Alliance, "The Treacherous 12 CloudComp uting Top Threats in 2016," Security, no. February, pp. 1-34, 2016.
|
8 |
M. Kazim and S. Zhu, "A Survey on Security Threats in CloudComputing Technology," Int. J. Res., vol. 1, no. 8, pp. 1071-1081, 2015.
|
9 |
G. Aswini and R. Mervin, "A Survey on Cloud Security Issuesand Techniques," Int. J. Comput. Sci. Appl., vol. 4, no. 1, pp.125-132, 2016.
DOI
|
10 |
https://cloudsecurityalliance.org/download/top-threats-cloud-computing-plus-industry-insights/
|
11 |
PARK, Jae-Kyung; LEE, Won Joo; LEE, Kang-Ho. A Study on the Isolated Cloud Security Using Next Generation Network. Journal of The Korea Society of Computer and Information, Vol. 22, No. 11, pp. 9-16, 2017.
DOI
|
12 |
VARGHESE, Blesson; BUYYA, Rajkumar. Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, pp. 849-861, 2018.
|